Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for detecting access control strategy collision in collaborative environment

An access control policy and conflict detection technology, applied in transmission systems, digital transmission systems, instruments, etc., can solve autonomous domain access control policy conflicts, reduce the security of computer network systems, and do not consider the semantic heterogeneity of access control policies, etc. question

Inactive Publication Date: 2012-03-21
BEIHANG UNIV
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, on the one hand, with the increase of information and data access requirements, people pay more and more attention to the security and privacy of data. Therefore, in the inter-domain interoperability and collaboration environment based on role mapping, the access control policies formulated by each domain administrator Especially important, if there is a problem, it will directly lead to unauthorized access to autonomous domain resources
On the other hand, different autonomous domains may use different semantics to describe their access control policies, and the roles that are currently interoperable and mapped between autonomous domains may still have more authorizations for the roles than the roles require. Less, this cannot be completely avoided. The inconsistency between the permissions actually granted to the role and the permissions required by the role will lead to conflicts between the access control policies of each autonomous domain, and eventually lead to unauthorized access to the resources of the autonomous domain
At present, most of the research on policy conflicts does not consider the semantic heterogeneity of access control policies formulated by different domains, and cannot effectively detect conflicts, so that users cannot resolve conflicts, making unauthorized access and other security issues easy to occur , leading to a decrease in the security of the computer network system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for detecting access control strategy collision in collaborative environment
  • System and method for detecting access control strategy collision in collaborative environment
  • System and method for detecting access control strategy collision in collaborative environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Such as figure 1 As shown, the access control policy conflict detection system in the collaborative environment of the present invention is composed of an access control policy preprocessing module, a multi-domain policy integration module and a policy conflict detection module.

[0038] The whole implementation process is as follows:

[0039]Access control policy preprocessing module: use the policy files of the two domains described by XACML, that is, the access control policies in the A domain policy file described by XACML and the B domain policy file described by XACML to perform syntax and semantic analysis. While parsing, add a serial number to each access control strategy as the unique identifier of the access control strategy, form an ordered set of access control strategies after parsing, and send the ordered set of access control strategies to the multi-domain policy integration module; The domain is the basic unit of the collaborative environment, that is, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for detecting access control strategy collisions in a collaborative environment. Firstly the problem of semantic isomerism of access control strategy used by each region in the collaborative environment among mutually-operated regions based on role mapping is solved, and on the basis, the problem of the access control strategy collisions in the collaborative environment is solved; therefore, the system and the method are particularly suitable for use in a collaborative environment with semantic isomerism. The technology adopts an improved strategy integration algorithm based on semantic integration and a strategy collision detection algorithm based on subgraph isomorphism as main algorithms. The main activities of the detection technology for the access control strategy collision in the collaborative environment comprise strategy pre-processing, multi-region strategy integration and strategy collision detection activity. The invention can detect the access control strategy collisions caused by mutual operation among regions by role mapping, so as to avoid the safety problems of unauthorized access and the like.

Description

technical field [0001] The invention relates to an access control policy conflict detection system and method in a collaborative environment, belonging to the field of computer network security. Background technique [0002] In most practical collaborative environments, neither developers nor managers want to completely abandon the existing authority management and access control systems, but hope to maintain a balance between the openness of authorization and the cost of system transformation. Inter-domain interoperability based on role mapping can effectively avoid the maintenance cost caused by modifying a large number of access control policies, enhance the convenience of cooperation between cross-domain organizations in the form of resource sharing, and reduce the heterogeneity of authorization systems and users in cross-domain environments. The management risk brought by the surge, so inter-domain interoperability based on role mapping has gradually become a representa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26G06F21/00G06F21/57
Inventor 夏春和范贝贝梁晓艳罗杨薄阳
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products